Mobile Security: The Risks and How to Protect Your Smartphone

Know the Threats

1. Ads and TOS agreements

One popular way for malware writers to siphon money from your smartphone or tablet is to insert malicious ads and Term of Service (TOS) agreements into apps.

“In 99 percent of the SMS malware we see, apps actually request the permission to send text messages,” said Tim Armstrong, malware analyst for Kaspersky Lab. “People are just so conditioned to click through all these screens just to get to the end of the install that they don’t review any of the permissions, and a lot of times they’re giving away the right to charge them money.”

2. Unregulated app markets

The jury is out when it comes to Apple versus Android, but there’s one advantage that iPhones have over phones running Google’s OS. Apple’s App Store exerts much tighter controls over incoming apps, requiring developers to undergo a rigorous approval process. However, Google isn’t sitting still. It recently launched its Bouncer system, which is designed to search for malicious code in a new app before it’s admitted to the Android Market. And the company claims that since its launch, malware in the store has dropped 40 percent. Unfortunately, the problem of malicious apps is even more prevalent in third-party app stores, which often stock repackaged versions of popular apps that—you guessed it—include malware.

3. SMS trojans

Essentially mobile pickpocketing, this threat comes in the form of apps that, once downloaded, send text messages or make calls to premium-rate phone numbers from your smartphone, stealing money from your account in the process. The malicious app may pose as an SMS managing service, or it may look like it has a completely different purpose based on its listing in the app store. However, according to Armstrong, SMS Trojans are more prevalent in Europe and Canada than in the U.S., as our SMS systems are configured differently.

4. Software flaws and out-of-date OSes

Malware writers aren’t the only ones responsible for mobile security vulnerabilities; sometimes it’s the phone manufacturers themselves that unintentionally push flawed code to handsets. For example, in October 2011, the AT&T version of the Samsung Galaxy S II was found to have a gaping security flaw: If the pattern unlock screen timed out, waking it up would grant access to the phone, bypassing the need to enter a PIN number.

Though Samsung and other companies offer software updates to fix such security flaws, they don’t always apply to every version of an operating system. As Kaspersky’s Armstrong explained, “There are all these different models out there, all running different versions of the Android operating system. Unless you’re buying a new phone or device every six months, a lot of the time you’re not going to get the latest version of the operating system with the security patches.” According to Armstrong, the most popular version of the Android smartphone OS is currently 2.2 (Froyo). The most recent version (as of press time) is 4.0 (Ice Cream Sandwich).

5. Mobile payment systems

NFC (Near Field Communication) technology lets you pay for items using your smartphone, which, as Google Wallet has demonstrated, can be extremely convenient. As of press time, though, Google Wallet had been hacked twice and, after briefly suspending issuing new prepaid cards, fixed the service.

Google, using lesser-known payment systems, could give scammers access to your digital wallet also. NFC payment programs tend to be the most secure, as they generally entail partnerships with high-profile companies that take encryption seriously, such as Visa.

“Retailers are scared about waiters and waitresses at restaurants walking away with your credit card, scanning it once for themselves and then scanning it once to actually pay for your meal,” explained Armstrong. “There’s a danger of skimming there. Mobile payment devices like Square are so small and you’re putting a lot of capabilities in other people’s hands.”

 

Mobile Phone Security: The Risks and How to Protect Your Smartphone

LEAVE A REPLY
Name*
Email* (will not be published)
Website
*Indicates required field
Comments*
Submit Comments

FIND A REVIEW
Laptops
All Product Types Accessories Cars Digital Camcorders Digital Cameras eReaders GPS Laptops MP3 & Video Players Projectors Smartphones Software Storage Tablets / MIDs VoIP Wi-Fi
All Subcategories
All Subcategories All-Purpose Budget Business Desktop Replacement Gaming Multimedia Netbook Nettop Rugged Student Tablet PCs Ultraportable
Brand
Acer Alienware Apple Archos ASUS Averatec BenQ CTL Corp. Dell Digital Storm eMachines Emtec Everex Fujitsu GammaTech Gateway General Dynamics Getac Gigabyte Hercules HP HTC iBuyPower Intel Lenovo MSI Nokia Nvidia OCZ OLPC OQO Origin Panasonic Sager Samsung Sony Sylvania Systemax TabletKiosk Toshiba Verizon Viewsonic Viliv VooDoo Workhorse PC ZT Systems
Minimum Rating
Any Rating Editor's Choice 4.5 Stars 4.0 Stars 3.5 Stars 3.0 Stars
Screen Size
10 11 12 13 14 15 16 17 18 20 4 5 6 7 8 9
Resolution
1024x576 1024x600 1024x768 1200X800 1280 x 720 1280x1024 1280x768 1280x800 1366x678 1366x768 1440x1050 1440x900 1600x768 1600x900 1680x1050 1680x945 1920x1080 1920x1200 800x400 800x480
Weight Range
10.1 - 12.0 pounds 12.1 - 14.0 pounds 14.1 - 16.0 pounds 2 lbs 2 pounds and under 2+ lbs 2.1 - 4.0 pounds 4.1 - 6.0 pounds 6.1 - 8.0 pounds 8.1 - 10.0 pounds Over 16 pounds Under 2 pounds
more options
SUBSCRIBE